Italian security researchers working with the University of California Irvine have discovered a potential security issue related to Voice over Internet Protocol (VoIP) systems, and it sounds like an espionage technique out of a James Bond film.
The Security of Using Unified Communications for Hesperia Businesses
In essence, the researchers found that the sound of a keyboard used during a VoIP voice call or video conference could be recorded and subsequently analyzed to construct the alphanumeric information entered during the call. This security issue is created by the signature sounds made by various keyboards, which can be matched to the typing style of the user to get an idea about the data or message the user created.
According to the paper submitted by the researchers, the idea of capturing acoustic emanations from keyboards for espionage purposes dates back to World War II. The security issue has been dubbed "Skype and Type" due to the popularity of that particular Microsoft app, but it can be used against any VoIP platform.
In the near future, most business owners in Hesperia and other High Desert municipalities will use unified communications, abbreviated as UC, as their primary data and messaging channel. Unified communications solutions work thanks to the Voice over Internet Protocol, known as VoIP, which requires some security safeguards.
Combining Hesperia VoIP Services with Other Business Solutions
UC business solutions augment office communications by combining messaging, calls, video conferencing, email, and data collection into a single software platform, which can be hosted in the cloud for easy access through a web browser.
The Skype and Type vulnerability is plausible due to the nature of VoIP; in order to guarantee crystal clear voice calls, VoIP applications improve the spectral quality of the sounds picked up by hardware microphones as they are converted to digital audio for transmission. If someone is typing away on a keyboard during a VoIP call, the other party could record the entire conversation and run it through an audio spectrum analyzer for further matching with keyboard types and the typing style of the caller.
Naturally, a successful Skype and Type attack would require substantial profiling and sophistication that would be more suitable to the United States National Security Agency. Furthermore, the NSA could use artificial intelligence and machine learning techniques to improve the likelihood of interception.